Analysis
-
max time kernel
146s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-01-2025 17:17
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
XClient.exe
Resource
win10v2004-20241007-en
General
-
Target
XClient.exe
-
Size
80KB
-
MD5
18bfa92b77cf828eef637da14eefb770
-
SHA1
9c010b423e035c0751050bf96f61750509734029
-
SHA256
70441672a9bdcdab038ce4944ddb852afd678f38a6058601dc3f5cd57b5bea60
-
SHA512
de1cdaa74edf4d0604bc4625ee55ea15d627378c243b65e4cf19c9d5d28abdaafad288172ac7323d5ab1869b530f96dd553b38fe548ee6a4df4e2934fb9c3ca4
-
SSDEEP
1536:WJmDhjyCoaQ7o7nacdQNZwKdeol9bYjZomFqW6XOmH7AHmn+k:bVjVeOnacdQEwj9bY1omFcOmH7F+k
Malware Config
Extracted
xworm
publication-glossary.gl.at.ply.gg:4444
-
Install_directory
%AppData%
-
install_file
USB.exe
-
telegram
https://api.telegram.org/bot7704029346:AAHPre1lXQa0UfPCpOUXJZ9UXA9mFxvH4Gk/sendMessage?chat_id=7590668020
Signatures
-
Detect Xworm Payload 4 IoCs
resource yara_rule behavioral1/memory/2228-1-0x0000000000920000-0x000000000093A000-memory.dmp family_xworm behavioral1/files/0x0005000000012000-34.dat family_xworm behavioral1/memory/316-36-0x0000000000010000-0x000000000002A000-memory.dmp family_xworm behavioral1/memory/2200-39-0x0000000000D70000-0x0000000000D8A000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2808 powershell.exe 2572 powershell.exe 2588 powershell.exe 1988 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\security.lnk XClient.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\security.lnk XClient.exe -
Executes dropped EXE 3 IoCs
pid Process 316 security 2200 security 2312 security -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\security = "C:\\Users\\Admin\\AppData\\Roaming\\security" XClient.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2992 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2228 XClient.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2808 powershell.exe 2572 powershell.exe 2588 powershell.exe 1988 powershell.exe 2228 XClient.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 2228 XClient.exe Token: SeDebugPrivilege 2808 powershell.exe Token: SeDebugPrivilege 2572 powershell.exe Token: SeDebugPrivilege 2588 powershell.exe Token: SeDebugPrivilege 1988 powershell.exe Token: SeDebugPrivilege 2228 XClient.exe Token: SeDebugPrivilege 316 security Token: SeDebugPrivilege 2200 security Token: SeDebugPrivilege 2312 security -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2228 XClient.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2228 wrote to memory of 2808 2228 XClient.exe 30 PID 2228 wrote to memory of 2808 2228 XClient.exe 30 PID 2228 wrote to memory of 2808 2228 XClient.exe 30 PID 2228 wrote to memory of 2572 2228 XClient.exe 32 PID 2228 wrote to memory of 2572 2228 XClient.exe 32 PID 2228 wrote to memory of 2572 2228 XClient.exe 32 PID 2228 wrote to memory of 2588 2228 XClient.exe 34 PID 2228 wrote to memory of 2588 2228 XClient.exe 34 PID 2228 wrote to memory of 2588 2228 XClient.exe 34 PID 2228 wrote to memory of 1988 2228 XClient.exe 36 PID 2228 wrote to memory of 1988 2228 XClient.exe 36 PID 2228 wrote to memory of 1988 2228 XClient.exe 36 PID 2228 wrote to memory of 2992 2228 XClient.exe 38 PID 2228 wrote to memory of 2992 2228 XClient.exe 38 PID 2228 wrote to memory of 2992 2228 XClient.exe 38 PID 2840 wrote to memory of 316 2840 taskeng.exe 42 PID 2840 wrote to memory of 316 2840 taskeng.exe 42 PID 2840 wrote to memory of 316 2840 taskeng.exe 42 PID 2840 wrote to memory of 2200 2840 taskeng.exe 43 PID 2840 wrote to memory of 2200 2840 taskeng.exe 43 PID 2840 wrote to memory of 2200 2840 taskeng.exe 43 PID 2840 wrote to memory of 2312 2840 taskeng.exe 45 PID 2840 wrote to memory of 2312 2840 taskeng.exe 45 PID 2840 wrote to memory of 2312 2840 taskeng.exe 45 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\XClient.exe"C:\Users\Admin\AppData\Local\Temp\XClient.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2808
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2572
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\security'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2588
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'security'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1988
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "security" /tr "C:\Users\Admin\AppData\Roaming\security"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2992
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {1D01F936-DC93-4300-95A0-A26E508CA902} S-1-5-21-2872745919-2748461613-2989606286-1000:CCJBVTGQ\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Roaming\securityC:\Users\Admin\AppData\Roaming\security2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:316
-
-
C:\Users\Admin\AppData\Roaming\securityC:\Users\Admin\AppData\Roaming\security2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2200
-
-
C:\Users\Admin\AppData\Roaming\securityC:\Users\Admin\AppData\Roaming\security2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2312
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5f93bffdc325955ae0797f2dc922d27fb
SHA14d7bb0cbb943450389bc451699269d2fae448c8b
SHA25623e6e5ea9d3e00a90fd918b08786efa3d914d3f87068a9804bd1b51817e65058
SHA5127d3616bfa943f84fecd30bfd9b4af90f541b2c472fbf7a7318813e55d5cfe639cb04aba893e8cfb33c0541c9ff90bd33c6de151234d89db80bae2cc27a1bf0de
-
Filesize
80KB
MD518bfa92b77cf828eef637da14eefb770
SHA19c010b423e035c0751050bf96f61750509734029
SHA25670441672a9bdcdab038ce4944ddb852afd678f38a6058601dc3f5cd57b5bea60
SHA512de1cdaa74edf4d0604bc4625ee55ea15d627378c243b65e4cf19c9d5d28abdaafad288172ac7323d5ab1869b530f96dd553b38fe548ee6a4df4e2934fb9c3ca4